What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
securityintelligence.webp 2017-10-17 12:15:51 Don\'t Just Put Out the Zero-Day Fire - Get Rid of the Fuel (lien direct) The best way to remediate zero-day threats is to focus on proactively assessing and patching the vulnerabilities that facilitate them.
securityintelligence.webp 2017-10-17 11:20:48 Today\'s Predictions for Tomorrow\'s Internet: IBM Experts Look Ahead for NCSAM (lien direct) For week three of NCSAM, seven IBM Security experts offered their predictions about the future of the technology and cybercrime.
securityintelligence.webp 2017-10-16 13:01:17 Diving Into Zberp\'s Unconventional Process Injection Technique (lien direct) IBM X-Force Research discovered a new variant of Zberp that evades API threat detection tools using a code injection technique it borrowed from Carberp.
securityintelligence.webp 2017-10-16 12:00:49 Make Security Culture Your Top Priority (lien direct) An organization can have all the technology and expertise money can buy, but a poor security culture can still lead to devastating data breaches. Guideline
securityintelligence.webp 2017-10-16 11:05:55 Seven More NCSAM Tips for Cybersecurity Professionals: Week Two (lien direct) Individual users and organizations should take the time to adopt better security practices during National Cybersecurity Awareness Month (NCSAM).
securityintelligence.webp 2017-10-13 11:35:44 Is My Fitness Band Protected? An Exercise in IoT Security (lien direct) Connected devices such as fitness bands hold the potential to revolutionize daily life, but they also pose IoT security risks.
securityintelligence.webp 2017-10-12 12:00:51 How an Effective Incident Response Plan Can Help You Predict Your Security Future (lien direct) An incident response plan and thorough analysis of historical threat data can help security teams predict how fraudsters might breach their networks.
securityintelligence.webp 2017-10-12 12:00:48 Not Your Father\'s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM (lien direct) These five cybersecurity tips can help users review and update their online practices to protect their identities from advanced threats.
securityintelligence.webp 2017-10-11 15:15:50 TrickBot Takes to Latin America, Continues to Expand Its Global Reach (lien direct) The cybergang operating the TrickBot banking Trojan were unusually active over the summer, launching new campaigns in Latin America and updating its code.
securityintelligence.webp 2017-10-11 13:10:46 Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month (lien direct) Enterprises and individual users should follow these six account protection tips not just during National Cyber Security Anwareness Month, but year-round.
securityintelligence.webp 2017-10-11 11:30:46 Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption (lien direct) Fail-safe measures such as encryption can help organizations minimize cloud and third-party risks in the virtually inevitable event of a data breach.
securityintelligence.webp 2017-10-10 11:55:46 The \'Cracken\': The Evolution of Password Cracking (lien direct) IBM X-Force Red is leading the way in the field of password cracking with the Cracken, a tool designed to help companies improve password hygiene. Guideline
securityintelligence.webp 2017-10-10 11:10:46 Looking Back at Themes From National Cyber Security Awareness Month 2016 (lien direct) 2016 may be in the past, but themes from last year's National Cyber Security Awareness Month should still be top of mind for security professionals.
securityintelligence.webp 2017-10-09 12:40:46 Five Ways an External Risk Adviser Can Help the Board Solve the Cyber Risk Puzzle (lien direct) Executives need an external risk adviser to help them monitor the cyber risk landscape and implement, monitor and refine security controls accordingly.
securityintelligence.webp 2017-10-09 11:55:52 Online Safety Tips for NCSAM 2017: Lessons From Week One (lien direct) Security professionals can take away these seven cybersecurity lessons from the first week of National Cyber Security Awareness Month (NCSAM).
securityintelligence.webp 2017-10-09 11:20:45 Five Key Differences Between Personal and Enterprise Endpoint Security (lien direct) CISOs must understand the key difference between individual and enterprise endpoint security to adequately protect corporate data.
securityintelligence.webp 2017-10-06 12:00:50 Sink or Swim: Uniting the C-Suite, Sales and Security to Fight Advanced Cyberattacks (lien direct) An advanced cyberattack can sink an entire company if it doesn't put the proper lifeboats in place and foster collaboration between disparate departments.
securityintelligence.webp 2017-10-06 12:00:47 The CISO\'s Guide to Minimizing Health Care Security Risks (lien direct) CISOs must possess skills and expertise in multiple areas to combat health care security risks in this age of ransomware and connected medical devices.
securityintelligence.webp 2017-10-05 11:50:42 Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks (lien direct) Without the proper context of risk analysis, evaluations of security investments that involve ROI calculations are virtually meaningless.
securityintelligence.webp 2017-10-05 11:45:42 Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl (lien direct) Intellectual property security is crucial to any company's bottom line. IT teams must locate this data, asses its risk and adjust policies accordingly.
securityintelligence.webp 2017-10-04 11:40:47 Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration (lien direct) Cybersecurity is like a seat belt: While uncomfortable at first, it is crucial to the safety of your organization as it undergoes a digital transformation.
securityintelligence.webp 2017-10-03 15:55:43 POS Malware Breach Sees Payment Cards Hit Underground Shops (lien direct) A popular fast-food chain and supermarket were recently breached by POS malware. Some of the credit card details had been up for sale for more than a week.
securityintelligence.webp 2017-10-03 11:55:40 Cybersecurity Strategy, Risk Management and List Making (lien direct) A framework such as the NIST CSF can help security professionals determine where to start when developing a cybersecurity strategy.
securityintelligence.webp 2017-10-03 11:20:43 Basic Security Tools You Cannot Afford to Miss in Your Risk Management Program (lien direct) Security professionals can leverage freely available, open source security tools to protect their environments from threats.
securityintelligence.webp 2017-10-02 12:10:43 The Cognitive Security Glide Path (lien direct) Cognitive security solutions help security teams distinguish valuable threat data from noise on the network and respond to incidents more efficiently.
securityintelligence.webp 2017-10-02 11:30:42 National Cyber Security Awareness Month: The 2017 Outlook (lien direct) October is National Cyber Security Awareness Month, a combined effort of private industries and public agencies to promote security best practices.
securityintelligence.webp 2017-10-02 08:25:41 How We Developed the IBM Security GDPR Framework (lien direct) IBM Security developed a five-phase GDPR framework to help organizations achieve and maintain compliance with the upcoming privacy law.
securityintelligence.webp 2017-09-29 13:00:55 Back to Filing Cabinets? Simplifying the Complex Task of Data Security (lien direct) Without visibility into all data stored on the network, the complex task of data security can have IT teams pining for the bygone days of filing cabinets.
securityintelligence.webp 2017-09-29 11:45:40 Getting an Earful: Convincing Employees to Care About Network Security (lien direct) When scare tactics and strict security policies fall on deaf ears, CISOs must find more productive ways to educate employees about network security risks.
securityintelligence.webp 2017-09-28 11:05:39 Six Key Traits of an Effective Cyber Risk Advisor (lien direct) What makes a good cyber risk advisor? Here are six traits and abilities that you should look for in a trusted security advisor.
securityintelligence.webp 2017-09-28 09:25:39 False Positives Are a True Negative: Using Machine Learning to Improve Accuracy (lien direct) Machine learning can be a boon for businesses, but effective machine learning must help analysts cut through the noise with few false positives.
securityintelligence.webp 2017-09-27 11:50:40 Put Threat Intelligence Into Action With Security Apps (lien direct) An update to IBM X-Force Exchange provides recommended apps to help users implement threat intelligence into their end-to-end security portfolio.
securityintelligence.webp 2017-09-27 11:00:42 What Do Recent Attacks Mean for OT Network Security? (lien direct) Cyberattacks such as WannaCry, NotPetya and Industroyer wreaked havoc on organizations, but they provided lessons for security your OT network. NotPetya Wannacry
securityintelligence.webp 2017-09-26 12:25:41 A \'Star Trek\' Darkly: To Boldly, Securely and Easily Go to the Cloud (lien direct) Tap into the "Star Trek" future through an identity-as-a-service solution light years ahead of its time.
securityintelligence.webp 2017-09-26 11:45:39 Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges (lien direct) Security leaders in the health care, financial services, and energy and utilities sectors must pay special attention to industry-specific security risks. Guideline
securityintelligence.webp 2017-09-26 11:10:40 How the Value Outweighs the Cost of Security (lien direct) Regardless of a company's size, the value of building a strong security posture will always outweigh the cost of security.
securityintelligence.webp 2017-09-25 12:30:49 Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks (lien direct) Security teams needs advanced visibility into all endpoints across the organization to prevent endpoint attacks such as the recent Apache Struts exploit.
securityintelligence.webp 2017-09-25 11:50:41 From the Starship Enterprise to Your Enterprise: Eight Cybersecurity Lessons From \'Star Trek\' (lien direct) To prepare for the upcoming "Star Trek: Discovery" series, here are eight cybersecurity lessons companies can learn from the science fiction franchise.
securityintelligence.webp 2017-09-25 10:40:38 Data Activity Monitoring Gives Health Care Organizations X-Ray Vision Into Medical Imaging Security Risks (lien direct) Poor medical imaging security can have potentially life-threatening consequences such as delayed treatment, inaccurate diagnosis and prescription fraud.
securityintelligence.webp 2017-09-22 12:01:00 The Cloud Security Risks Hidden in Plain Sight (lien direct) Organizations must pay closer attention to cloud security risks, such as third-party access and human error, that are hiding in plain sight.
securityintelligence.webp 2017-09-22 11:00:43 Building Digital Trust, One Blockchain at a Time (lien direct) Blockchain technology enables all participants in a transaction to validate whether the assets involved have been altered or tampered with.
securityintelligence.webp 2017-09-21 12:00:41 When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law (lien direct) When responding to a data breach, the CISO must work closely with the legal department to minimize the risks of litigation and reputational damage.
securityintelligence.webp 2017-09-21 12:00:37 The Myth of Mutual Exclusivity: Making the DevOps Process More Agile Without Compromising Security (lien direct) Does agility make the DevOps process less secure? A new survey suggested that, contrary to popular belief, security and agility aren't mutually exclusive.
securityintelligence.webp 2017-09-21 11:00:52 Leaking Cloud Databases and Servers Expose Over 1 Billion Records (lien direct) According to IBM X-Force, misconfigured cloud databases accounted for more than 71 percent of reported leaked records so far in 2017.
securityintelligence.webp 2017-09-20 13:15:34 Have We Been Wrong All Along About Good Password Practices? (lien direct) In its new guidelines on secure password practices, NIST recommended using long strings of random words instead of a combination of characters and symbols.
securityintelligence.webp 2017-09-20 12:01:03 IBM Named a Leader in Latest IDC Worldwide MarketScape (lien direct) IBM was named a leader in the "IDC MarketScape: Worldwide Managed Security Services 2017 Vendor Assessment" for its ability to integrate MSS globally. Guideline
securityintelligence.webp 2017-09-20 11:30:47 Don\'t Sweep Web Application Penetration Testing Under the Rug (lien direct) Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.
securityintelligence.webp 2017-09-19 12:00:36 National IT Professionals Day: Recognizing the Saintly Patience of IT Workers (lien direct) CISOs should take a moment to recognize the hard work, patience and resilience of their staffers on National IT Professionals Day.
securityintelligence.webp 2017-09-19 11:15:33 Take a Hike: Navigating Your Identity Governance and Administration Process Engineering Journey (lien direct) Identity governance and administration process engineering remains a challenge despite growing awareness about the importance of IGA and IAM processes.
securityintelligence.webp 2017-09-19 10:00:41 Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold (lien direct) IBM Managed Security Services (MSS) detected a sixfold increase in attacks involving embedded CPU mining tools between January and August 2017.
Last update at: 2024-06-29 07:07:34
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter